FSE 08

  • Fast Software Encryption

  • 10-13 of February, 2008

  • Lausanne, Switzerland

Final Program of FSE 2008

SUNDAY February 10

From 17:00Registration
From 19:00Welcome Reception - Sponsored by [Nagravision]

MONDAY February 11

9:00 - 9:10Opening
9:10 - 10:10Session: SHA Collisions - Chair: Christian Rechberger
 Collisions for Step-Reduced SHA-256
 Ivica Nikolic and Alex Biryukov
 Collisions on SHA-0 in One Hour
 Stéphane Manuel and Thomas Peyrin
10:10 - 10:40Coffee break
10:40 - 11:30Invited Talk - Chair: Bart Preneel
 Hash functions and SHA-3
 Lars Knudsen
11:30 - 12:30Session: New Hash Function Designs - Chair: Bart Preneel
 The Hash Function Family LAKE
 Jean-Philippe Aumasson, Willi Meier, and Raphael C.-W. Phan
 SWIFFT: A Modest Proposal for FFT Hashing
 Vadim Lyubashevsky, Daniele Micciancio, Chris Peikert, and Alon Rosen
12:30 - 14:00Lunch
14:00 - 15:30Session: Block Cipher Cryptanalysis I - Chair: Pascal Junod
 A Unified Approach to Related-Key Attacks
 Eli Biham, Orr Dunkelman, and Nathan Keller
 Algebraic and Slide Attacks on KeeLoq
 Nicolas T. Courtois, Gregory V. Bard, and David Wagner
 A Meet-in-the-Middle Attack on 8-Round AES
 Huseyin Demirci and Ali Aydin Selçuk (presented by Orhun Kara)
15:30 -16:00Coffee break
16:00 - 17:30Session: Implementation Aspects - Chair: Tanja Lange
 Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis
 Matthieu Rivain, Emmanuelle Dottax, and Emmanuel Prouff
 SQUASH - a New MAC With Provable Security Properties for Highly Constrained Devices Such As RFID Tags
 Adi Shamir
 (Short talk) Differential Fault Analysis of Trivium
 Michal Hojsik and Bohuslav Rudolf
 (Short talk) Accelerating the Whirlpool Hash Function Using Parallel Table Lookup and Fast Cyclical Permutation
 Yedidya Hilewitz, Yiqun Lisa Yin, and Ruby B. Lee

TUESDAY February 12

9:00 - 10:30Session: Hash Function Cryptanalysis I - Chair: Stefan Lucks
 Second Preimage Attack on 3-Pass HAVAL and Partial Key-Recovery Attacks on NMAC/HMAC-3-Pass HAVAL
 Eunjin Lee, Jongsung Kim, Donghoon Chang, Jaechul Sung, and Seokhie Hong
 Cryptanalysis of LASH
 Scott Contini, Krystian Matusiewicz, Josef Pieprzyk, Ron Steinfeld, Guo Jian, Ling San, and Huaxiong Wang
 A (Second) Preimage Attack on the GOST Hash Function
 Florian Mendel, Norbert Pramstaller, and Christian Rechberger
10:30 - 11:00Coffee break
11:00 - 12:30Session: Stream Cipher Cryptanalysis I - Chair: Willi Meier
 Guess-and-Determine Algebraic Attack on the Self-Shrinking Generator
 Blandine Debraize and Louis Goubin
 New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4
 Subhamoy Maitra and Goutam Paul
 Efficient Reconstruction of RC4 Keys from Internal States
 Eli Biham and Yaniv Carmeli
12:30 - 14:00Lunch
14:00 - 15:30Session: Security Bounds - Chair: Tetsu Iwata
 An Improved Security Bound for HCTR
 Debrup Chakraborty and Mridul Nandi
 How to Encrypt with a Malicious Random Number Generator
 Seny Kamara and Jonathan Katz
 A One-Pass Mode of Operation for Deterministic Message Authentication: Security beyond the Birthday Barrier
 Kan Yasuda
15:30 - 16:00Coffee break
16:00 - 16:45Session: Entropy - Chair: Louis Granboulan
 Post-Processing Functions for a Biased Physical Random Number Generator
 Patrick Lacharme
 (Short talk) Entropy of the Internal State of an FCSR in Galois Representation
 Andrea Röck
16:45 - 17:45Rump Session - Chair: Dan Bernstein [Call for submissions]

WEDNESDAY February 13

9:00 - 10:30Session: Block Cipher Cryptanalysis II - Chair: Mitsuru Matsui
 Bit-Pattern Based Integral Attack
 Muhammad Reza Z'aba, Haavard Raddum, Matt Henricksen, and Ed Dawson
 Experiments on the Multiple Linear Cryptanalysis of Reduced Round Serpent
 Baudoin Collard, François-Xavier Standaert, and Jean-Jacques Quisquater
 Impossible Differential Cryptanalysis of CLEFIA
 Yukiyasu Tsunoo, Etsuko Tsujihara, Maki Shigeri, Teruo Saito, Tomoyasu Suzaki, and Hiroyasu Kubo
10:30 - 11:00Coffee break
11:00 - 12:30Session: Hash Function Cryptanalysis II - Chair: Alex Biryukov
 MD4 is Not One-Way
 Gaëtan Leurent
 Improved Indifferentiability Security Analysis of chopMD Hash Function
 Donghoon Chang and Mridul Nandi
 New Techniques for Cryptanalysis of Hash Functions and Improved Attacks on Snefru
 Eli Biham
12:30 - 14:00Lunch
14:00 - 14:45Session: Stream Cipher Cryptanalysis II - Chair: Orr Dunkelman
 (Short talk) Some Remarks on the Salsa20 Core Function
 Julio Cesar Hernandez-Castro, Juan M. E.Tapiador, and Jean-Jacques Quisquater
 New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba
 Jean-Philippe Aumasson, Simon Fischer, Shahram Khazaei, Willi Meier, and Christian Rechberger

Valid XHTML 1.0 Strict - Valid CSS 2.1

Some Rights Reserved 2007 LASEC - EPFL